GHSA-HQF9-8XV5-X8XW
8.10.04%
regreSSHion: The Return of the Signal Handler Nightmare
Amit Schendel
Senior Security ResearcherJan 5, 2026·5 min read·1 visit
PoC AvailableCISA KEV Listed
Executive Summary (TL;DR)
OpenSSH's sshd server contains a race condition in its signal handling logic. If a client does not authenticate within `LoginGraceTime`, a SIGALRM is triggered. The signal handler unsafely calls `syslog()`, which is not async-signal-safe. This can interrupt the heap manager in an inconsistent state, leading to heap corruption and eventual RCE as root. Attack complexity is high, but the impact is critical.
A signal handler race condition in OpenSSH's sshd server allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems. This is a regression of a vulnerability previously patched in 2006.
Official Patches
Fix Analysis (1)
Technical Appendix
CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HEPSS Probability
0.04%
Top 100% most exploited
14,000,000
Estimated exposed hosts via Shodan
Affected Systems
OpenSSH 8.5p1 through 9.7p1glibc-based Linux systems
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
OpenSSH OpenBSD | >= 8.5p1, < 9.8p1 | 9.8p1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-364 |
| Attack Vector | Network |
| CVSS v3.1 | 8.1 (High) |
| Impact | Unauthenticated RCE (Root) |
| Exploit Status | PoC Available / High Complexity |
| Root Cause | Signal Handler Race Condition |
MITRE ATT&CK Mapping
CWE-364
Signal Handler Race Condition
Signal Handler Race Condition
Known Exploits & Detection
Vulnerability Timeline
Vulnerability Publicly Disclosed by Qualys
2024-07-01
OpenSSH 9.8p1 Released
2024-07-01
Added to CISA KEV
2024-07-08
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.